GLOBAL KEYWORD INDEX
| ( | |
| (iterated) admissibility | |
| (Probabilistic) Integer Programs | |
| A | |
| abduction | |
| ABox abduction | |
| ABox approximation | |
| Abstract Interpretation | |
| Abstraction | |
| abstraction and refinement | |
| abstraction refinement | |
| Abstraction-Refinement | |
| Accuracy | |
| Actions | |
| Actual Causality | |
| Adversarial Attacks | |
| adversarial robustness | |
| Adversarial Training | |
| Aerospace | |
| Agda | |
| Aggressive Bound Descent | |
| AI Certification | |
| ALC | |
| Algebraic Measures | |
| Algorithmic Game Theory | |
| algorithmic graph theory | |
| all I know | |
| amortised cost analysis | |
| AND-OR graph | |
| Anti-unification | |
| archery | |
| arithmetic constraints | |
| Artificial intelligence | |
| ASP | |
| Associativity | |
| Assume-Guarantee Synthesis | |
| assumptions | |
| at least three keywords must be specified | |
| Autoencoding | |
| Automata | |
| Automata Theory | |
| Automata-Theoretic Approach | |
| automated algorithm configuration | |
| automated driving | |
| automated numerical planning and scheduling | |
| Automated reasoning | |
| Automated Testing | |
| Automated Theorem Proving | |
| Automatic Complexity Analysis | |
| automatic verification | |
| automation | |
| automatizability of proof systems | |
| Average-case complexity | |
| Aviation | |
| B | |
| B\"uchi automata | |
| backdoor attack | |
| Backtracking Search | |
| battle of Hercules and Hydra | |
| Bayesian Machine Learning | |
| BCT | |
| BDD | |
| Belief Propagation | |
| Belief revision | |
| Bell Labs | |
| benchmarking | |
| benchmarks | |
| Bernays–Schönfinkel Fragment | |
| best-effort synthesis | |
| Beth Definability Property | |
| binary codes | |
| Binary Decision Diagrams | |
| bisimulation | |
| bit pigeonhole principle | |
| Block Ciphers | |
| blockchain | |
| Blockchains | |
| blocked clauses | |
| boolean satisfiability | |
| Boolean synthesis | |
| Bounded arithmetic | |
| Bounded model checking | |
| branch-and-bound | |
| branch-and-cut | |
| Branching Time | |
| Büchi automata | |
| C | |
| cache coherence | |
| Calculus of Names | |
| Cardano | |
| Categorial Robustness | |
| category theory | |
| CAV | |
| CDCL | |
| CDCL Algorithm | |
| Certification | |
| Choice logics | |
| Circumscription | |
| Classification | |
| Clausal Proofs | |
| Clause exchange | |
| clause learning from simple models | |
| clause redundancy | |
| Closed Form | |
| closure redundancy | |
| Cloud Security | |
| CNF | |
| CNF Encoding | |
| Combinations of Logic and Machine Learning | |
| Combinations of Solvers and Gradient Descent | |
| Combinatorial optimization | |
| combinatorial structures | |
| Combinatorics | |
| combining decision procedures | |
| Commonsense reasoning | |
| Commutativity | |
| comonads | |
| Comparators | |
| compilation scheme | |
| compiler optimization | |
| Compiler verification | |
| complementation | |
| Completeness guarantees | |
| Complexity | |
| complexity analysis | |
| complexity over structures | |
| Compositional Synthesis | |
| comprehensibility | |
| computability over structures | |
| computable queries | |
| computational complexity | |
| Computing methodologies | |
| Concept Referring Expressions | |
| Concurrency | |
| Confluence | |
| connectedness | |
| Consensus Protocols | |
| consequence relations | |
| Consistency Analysis | |
| Constrained Horn Clauses | |
| Constrained Single-Row Facility Layout Problem | |
| Constraint acquisition | |
| constraint logic programming | |
| Constraint Optimization | |
| Constraint Optimization Problems | |
| constraint programming | |
| constraint satisfaction | |
| constraint satisfaction problems | |
| Constraint simplification | |
| constraint solving | |
| Constraint tableaux | |
| contextuality | |
| continuous reachability | |
| Control-Flow Refinement | |
| Controller Synthesis | |
| convolutional autoencoders | |
| Convolutional Neural Networks | |
| Convolutional Neural Networks Verification | |
| Cooperation in MAS | |
| Coq | |
| correct-by-construction | |
| counter systems | |
| Counterexamples | |
| counterfactual explanations | |
| Counterfactual Reasoning | |
| countermodel construction | |
| Counting | |
| Counting queries | |
| Craig interpolants | |
| CSP | |
| CTL* | |
| Cut Elimination | |
| cut-elimination | |
| cutting planes | |
| Cyber-physical systems | |
| Cyclic proofs | |
| cylindrical algebraic coverings | |
| D | |
| Data analysis | |
| Data Complexity | |
| data federation | |
| data logics | |
| data-driven algorithm design | |
| Data-driven invariant learning | |
| Data-driven methods | |
| Databases | |
| databases as logical theories | |
| decidability | |
| decidable subclasses | |
| Decision Diagrams | |
| Decision Procedure | |
| decision tree | |
| deep learning | |
| Deep Learning Compiler | |
| Deep Neural Network Verification | |
| Deep Neural Networks | |
| Deep reinforcement learning | |
| Default logic | |
| Defeasible Knowledge | |
| definitions | |
| Delegate Reasoner | |
| Denotational semantics | |
| Description Logic | |
| Description Logic EL | |
| Description Logics | |
| Descriptive Complexity | |
| determinism | |
| Deterministic Emerson-Lei automata | |
| Determinization | |
| Diagonalizable matrices | |
| Dial-A-Ride | |
| Differentiable Logic | |
| differential dynamic logic | |
| Differential Privacy | |
| Dimensionality reduction | |
| Discrete mathematics | |
| Discrete Optimization | |
| disjointness | |
| distributed ledger | |
| Distributed Synthesis | |
| Distributed Systems | |
| Divide-and-Conquer | |
| DL-Lite | |
| DL-Lite-Horn | |
| DNF | |
| document stores | |
| Domain Specific Languages | |
| domain-specific language | |
| Dominance Breaking | |
| Dominance Relations | |
| DQBF | |
| Dynamic Logic | |
| E | |
| Effective algorithms | |
| Efficient reasoning | |
| EL ontologies | |
| elaborator reflection | |
| Electric power network | |
| Emerson-Lei acceptance | |
| Emerson-Lei automata | |
| encoding | |
| Energy Efficiency | |
| Ensembles | |
| entailment | |
| Entropy | |
| Entropy Estimation | |
| enumeration | |
| Epistemic Logic | |
| equational unification | |
| Equivalence Verification | |
| Ethereum | |
| evaluation | |
| Eventual non-negativity | |
| Evolution | |
| Exact Learning | |
| exclusion set | |
| experiments | |
| Explainable AI | |
| Explanation | |
| Explanations | |
| explicit definability | |
| expressive DLs | |
| expressive power | |
| extended resolution | |
| F | |
| factor interpretation | |
| Fair simulation | |
| fairness | |
| Fairness Verification | |
| Farkas' Lemma | |
| fault isolation | |
| feature extraction | |
| Filtering algorithm | |
| finite axiomatizability | |
| Finite model theory | |
| finite-variable logics | |
| firmware | |
| first-order logic | |
| first-order logic with equality | |
| First-order LTL | |
| first-order theorem proving | |
| fixed point theory | |
| Fixed-domain semantics | |
| fixpoint logic | |
| FL0 and FLbot | |
| Forgetting | |
| Formal | |
| formal logic | |
| formal methods | |
| Formal specification | |
| formal verification | |
| formalization | |
| Formula Simplification | |
| free-choice nets | |
| Functional correctness verification | |
| functional programming | |
| Fuzz Testing | |
| Fuzzy proximity relations | |
| G | |
| game | |
| game theory | |
| games | |
| gang membership | |
| Gauss-Jordan Elimination | |
| generalization | |
| generalization guarantees | |
| generalized soundness | |
| Generating functions | |
| Geometry Problem Solving | |
| Gini index | |
| graph databases | |
| Graph games | |
| Graph Neural Networks | |
| graph theory | |
| ground joinability | |
| Gödel logic | |
| H | |
| hardware | |
| Hardware Verification | |
| Haskell | |
| Heuristic function construction | |
| Hierarchical Models | |
| Higher-order logic | |
| higher-order term rewriting | |
| Hilbert-style proof systems | |
| hitting formulas | |
| homomorphic encryption | |
| Horn-fragments | |
| hybrid systems | |
| Hyperliveness | |
| HyperLTL | |
| Hyperproperties | |
| Hypersequents | |
| I | |
| iALC | |
| Imandra | |
| incomplete information | |
| inconsistency-tolerant semantics | |
| infeasibility | |
| Information Flow | |
| Information leakage | |
| inherently weak automata | |
| Inner-approximation | |
| Integer Difference Logic | |
| integer programming | |
| Integer Programs | |
| integer transition systems | |
| Interaction | |
| Interactive theorem proving | |
| Internet of Things | |
| Interpretability | |
| Intuitionistic Logic | |
| Invariance | |
| Invariant synthesis | |
| Isabelle/HOL | |
| J | |
| JSON documents | |
| Justifiable Exceptions | |
| justifications | |
| K | |
| k-consistency | |
| knapsack | |
| Knowledge Acquisition | |
| Knowledge compilation | |
| Knowledge Diversity | |
| Knowledge Integration | |
| knowledge representation | |
| Koopman operator | |
| L | |
| Lambek Calculus | |
| Language inclusion | |
| languages | |
| Large Neighbourhood Search | |
| lattice theory | |
| law enforcement | |
| Lazy clause generation | |
| Le\'sniewski | |
| learning from examples | |
| Learning-enabled systems | |
| Least General Generalizations | |
| ledger | |
| ledger model | |
| Legal Contracts | |
| Limit-Deterministic Buchi Automata | |
| Linear Approximation | |
| Linear Arithmetic | |
| Linear Bounding | |
| linear constraints | |
| Linear dynamical systems | |
| Linear Integer Arithmetic | |
| Linear Logic | |
| Linear Loops | |
| Linear recurrence sequences | |
| linear temporal logic | |
| Linear Time | |
| Linear Time Logic on Finite Traces | |
| Linear-time Temporal Logic on Finite and Infinite Traces | |
| Local robustness | |
| Local Search | |
| local verification | |
| logic | |
| Logic and finite model theory | |
| Logic and Law | |
| logic programming | |
| Logical theories | |
| Logics for Multi-Agent Systems | |
| Logics for the strategic reasoning | |
| loop acceleration | |
| Loop Invariant Generation | |
| Loop termination | |
| Loss Functions | |
| losslessness | |
| lower bounds | |
| lower runtime bounds | |
| LTL | |
| LTL model checking | |
| LTL over finite traces | |
| LTLf | |
| M | |
| machine learning | |
| Machine Learning Compiler | |
| machine learning theory | |
| magic wand | |
| Manufacturing | |
| Marabou | |
| Markov decision processes | |
| Martingales | |
| masking | |
| Match-bounds | |
| Mathematics of computing | |
| Matrix Algebra | |
| maximum satisfiability | |
| MaxSAT | |
| Mazurkiewicz Traces | |
| MDD | |
| Mean payoff | |
| Mechanism Design | |
| Mechanized Logic | |
| message passing | |
| meta-programming | |
| Minimal Independent Sets | |
| Minimal Modification | |
| Minimal tableau | |
| minimal unsastisfiable set | |
| minimality criterion | |
| misconceptions | |
| Mixed-Integer Programming | |
| modal logic | |
| Modal logics | |
| model checking | |
| Model counting | |
| Model-Checking | |
| Model-Free Reinforcement Learning | |
| Modular Reasoning | |
| Module checking | |
| monadic second-order logic | |
| Most specific concept | |
| MSC Languages | |
| Multi-Agent Path Finding | |
| Multi-agent systems | |
| Multi-Agent Systems (MAS) | |
| Multi-Layer Modification | |
| multi-modal verification | |
| Multi-Threaded Solving | |
| multiparty communication complexity | |
| Music generation | |
| N | |
| Natural Deduction | |
| Natural Language Understanding | |
| Neural network | |
| Neural Network Compression | |
| Neural Network Equivalence | |
| Neural Network Modification | |
| Neural Network Verification | |
| Neural Networks | |
| Neural networks verification | |
| Neurosymbolic AI | |
| NFA/MDD constraint | |
| NMatrices | |
| nominal logic | |
| Non-deterministic Semantics | |
| Non-linear constraints | |
| Non-monotonic reasoning | |
| Non-monotonic reasoning in DLs | |
| Non-optimality of proof systems | |
| non-termination | |
| nonlinear real arithmetic | |
| O | |
| OBDA | |
| Object-Centric Event Logs | |
| off-chain channels | |
| Omega Automata | |
| OMQA | |
| online LTL monitoring | |
| ontologies | |
| ontology | |
| Ontology Alignment | |
| Ontology repair | |
| Ontology-based data access | |
| ontology-mediated query | |
| Ontology-mediated query answering | |
| Open Problems | |
| optimal proof systems | |
| ordinary differential equations | |
| P | |
| paraconsistency | |
| Parallel Reasoning | |
| Parametric continuous-time Markov chains | |
| parametric solution | |
| Parity automata | |
| path orders | |
| Patient Transportation | |
| PB solving | |
| PCTL | |
| perfect matching | |
| Perspectives | |
| petri nets | |
| pigeonhole principle | |
| Planning | |
| Poisoning attacks | |
| polynomial calculus | |
| polynomial zonotopes | |
| Portfolio parallel SAT solver | |
| power side channels | |
| Predicate Abstraction | |
| Preferences | |
| preprocessing | |
| preserving primitivity | |
| prime implicates | |
| prioritized knowledge bases | |
| Probabilistic model checking | |
| probabilistic programming | |
| Probabilistic programs | |
| Procedure | |
| Process Mining | |
| Product Configuration | |
| Program equivalence | |
| program synthesis | |
| Program verification | |
| proof assistants | |
| proof checking | |
| proof complexity | |
| proof methodology | |
| proof of unsatisfiability | |
| proof presentation | |
| Proof Production | |
| Proof Theory | |
| proof-search | |
| Proof-search heuristics | |
| proofgold | |
| Proofs | |
| propagation redundancy | |
| propagation redundant proof | |
| propagation strength | |
| Property Based Testing | |
| property directed reachability analysis | |
| property language design | |
| Property-Based Testing | |
| Propositional Dynamic Logic | |
| propositional intermediate logics | |
| propositional logic | |
| propositional proof systems | |
| Propositional satisfiability | |
| Protégé Plugin | |
| pseudo-Boolean constraints | |
| Q | |
| QBF | |
| QPTIME | |
| Quantified Information Flow | |
| Quantitative reasoning | |
| Quantitative Synthesis | |
| Quantitative theories | |
| Quantitative verification | |
| Quantum Decision Model | |
| Quantum Machine Learning | |
| quantum mechanics | |
| Quantum Noise | |
| Queries | |
| Query Evaluation | |
| query optimization | |
| query rewriting | |
| query-by-example | |
| R | |
| R1CS | |
| Rabin automata | |
| random Fourier features | |
| randomization | |
| randomized communication complexity | |
| Randomized Planning | |
| Ranking Functions | |
| Rational Synthesis | |
| rationality | |
| reachability | |
| Reachability analysis | |
| reactive synthesis | |
| Reactive systems | |
| Realizability Checking | |
| Reasoning | |
| reasoning about actions | |
| Recollections | |
| reconfigurable interaction | |
| Recursive path ordering | |
| Reductions | |
| Redundancy Elimination | |
| Reed-Solomon coding | |
| Reentrancy Attack | |
| referring expressions | |
| Refutation calculus | |
| Register automata | |
| Regular expressions | |
| Regular path queries | |
| Reinforcement Learning | |
| relational complexity | |
| relational databases | |
| relational machines | |
| relevance | |
| Repair of Neural Networks | |
| representation learning | |
| Reproducible parallel SAT solving | |
| Requirements Analysis | |
| resolution | |
| resolution complexity | |
| Resolution over linear equations | |
| reverse engineering | |
| Reverse engineering of queries | |
| rewriting logic | |
| Right barren | |
| RNN | |
| Robust Compression | |
| Robust Solutions | |
| Robustness | |
| Robustness degree | |
| Robustness Verification | |
| roots of unity | |
| RSS | |
| Rule based temporal action logic | |
| rule-based reasoning | |
| Run-time checks | |
| Run-time enforcement | |
| S | |
| Safety | |
| sample complexity | |
| SAT encodings | |
| Sat Solver | |
| SAT Solving | |
| SAT-based algorithms | |
| SAT-based reasoning | |
| satisfiability | |
| satisfiability checking | |
| Satisfiability Modulo Theories | |
| Satisfiability Modulo Theory | |
| Satisfiability Solvers | |
| saturation-based theorem proving | |
| Scenario optimization | |
| Schedulers | |
| SDD | |
| Search methodologies | |
| secure blockchain | |
| Secure Multi-Party Computation | |
| security | |
| Security Policy | |
| Security Verification | |
| self-adjusting data structures | |
| Semantics | |
| semi-deterministic automata | |
| Semidefinite programming | |
| Sentence Embeddings | |
| Sentential Decision Diagram | |
| separation logic | |
| separations | |
| Sequence Variables | |
| sequencing | |
| Sequent Calculi | |
| Sequent Calculus | |
| Shannon Entropy | |
| sheaves and cohomology | |
| Signal temporal logic | |
| simplification order | |
| simulations | |
| situation calculus | |
| Skolem Problem | |
| Smart Contracts | |
| smart-contracts | |
| SMT | |
| SMT solvers | |
| SMT Solving | |
| software engineering | |
| Software Verification | |
| Solidity | |
| Solution counting | |
| sound and complete calculus | |
| soundness | |
| Species Interaction Code | |
| specification | |
| Spread constraint | |
| stability | |
| Standpoint | |
| state machines | |
| Statistical Model Checking | |
| Statistical Verification | |
| Stochastic Games | |
| Stochastic invariants | |
| Straight-line programs | |
| Strategic Reasoning | |
| Strategy Logic | |
| Strategy Scheduling | |
| String rewriting | |
| Strings | |
| Strongly Connected Components | |
| Strongly Connected Components (SCCs) | |
| structural soundness | |
| Subexponentials | |
| substitution | |
| Subsumption | |
| sum-of-squares | |
| superposition | |
| Survival of the Fitted | |
| Symbolic Model Checking | |
| symbolic reachability | |
| symmetries | |
| Symmetry breaking | |
| syntax with bindings | |
| Synthesis | |
| Synthesis under Environment Specifications | |
| Synthetic tableau | |
| T | |
| Tableaux | |
| Temporal Logic | |
| Temporal logics | |
| temporal reasoning | |
| term rewriting | |
| Termination | |
| termination analysis | |
| Testing | |
| theorem prover | |
| theorem proving | |
| theory of changes | |
| Theory of Sequences | |
| Threshold operators | |
| toasts | |
| tool | |
| TPTP | |
| Training Deep Neural Networks | |
| transformation | |
| transition systems | |
| Transitive Closure Logic | |
| translation | |
| Translation validation | |
| Transmission maintenance scheduling | |
| tree search | |
| tree-like proofs | |
| trustworthy AI | |
| TSPTW | |
| tuple interpretations | |
| Two-dimensional logics | |
| Type Theory | |
| U | |
| Uncertainty | |
| Underapproximation widening | |
| Undergraduate research project | |
| Uniform Random Sampling | |
| Uniform sampling | |
| upper runtime bounds | |
| user studies | |
| User study | |
| UTXO | |
| V | |
| Vardi | |
| Vardifest | |
| Variable Neighborhood Search | |
| Variable Ordering heuristic | |
| Vehicle Routing | |
| Verification | |
| verification of hybrid systems | |
| view-based query answering | |
| view-based query processing | |
| Virtual Knowledge Graph | |
| virtual machines | |
| Visualization | |
| W | |
| Weakest pre-expectations | |
| Weisfeiler-Leman | |
| Well-quasiorders | |
| workflow nets | |
| X | |
| XOR-CNF | |
| Z | |
| ZDD | |
| ZK protocols | |
| ω | |
| ω-automata | |
